ID REDHAT-RHSA-2011-0180.NASL Type nessus Reporter This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2011-01-28T00:00:00
Description
Updated pango and evolution28-pango packages that fix one security
issue are now available for Red Hat Enterprise Linux 4, 5, and 6.
The Red Hat Security Response Team has rated this update as having
moderate security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from
the CVE link in the References section.
Pango is a library used for the layout and rendering of
internationalized text.
An input sanitization flaw, leading to a heap-based buffer overflow,
was found in the way Pango displayed font files when using the
FreeType font engine back end. If a user loaded a malformed font file
with an application that uses Pango, it could cause the application to
crash or, possibly, execute arbitrary code with the privileges of the
user running the application. (CVE-2011-0020)
Users of pango and evolution28-pango are advised to upgrade to these
updated packages, which contain a backported patch to resolve this
issue. After installing the updated packages, you must restart your
system or restart your X session for the update to take effect.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Red Hat Security Advisory RHSA-2011:0180. The text
# itself is copyright (C) Red Hat, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(51811);
script_version("1.18");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_cve_id("CVE-2011-0020");
script_bugtraq_id(45842);
script_xref(name:"RHSA", value:"2011:0180");
script_name(english:"RHEL 4 / 5 / 6 : pango (RHSA-2011:0180)");
script_summary(english:"Checks the rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:"The remote Red Hat host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"Updated pango and evolution28-pango packages that fix one security
issue are now available for Red Hat Enterprise Linux 4, 5, and 6.
The Red Hat Security Response Team has rated this update as having
moderate security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from
the CVE link in the References section.
Pango is a library used for the layout and rendering of
internationalized text.
An input sanitization flaw, leading to a heap-based buffer overflow,
was found in the way Pango displayed font files when using the
FreeType font engine back end. If a user loaded a malformed font file
with an application that uses Pango, it could cause the application to
crash or, possibly, execute arbitrary code with the privileges of the
user running the application. (CVE-2011-0020)
Users of pango and evolution28-pango are advised to upgrade to these
updated packages, which contain a backported patch to resolve this
issue. After installing the updated packages, you must restart your
system or restart your X session for the update to take effect."
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2011-0020"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/errata/RHSA-2011:0180"
);
script_set_attribute(attribute:"solution", value:"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:evolution28-pango");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:evolution28-pango-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:pango");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:pango-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:pango-devel");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:4");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:4.8");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5.6");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6.0");
script_set_attribute(attribute:"vuln_publication_date", value:"2011/01/24");
script_set_attribute(attribute:"patch_publication_date", value:"2011/01/27");
script_set_attribute(attribute:"plugin_publication_date", value:"2011/01/28");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Red Hat Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
os_ver = os_ver[1];
if (! preg(pattern:"^(4|5|6)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 4.x / 5.x / 6.x", "Red Hat " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
if (!empty_or_null(yum_updateinfo))
{
rhsa = "RHSA-2011:0180";
yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
if (!empty_or_null(yum_report))
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : yum_report
);
exit(0);
}
else
{
audit_message = "affected by Red Hat security advisory " + rhsa;
audit(AUDIT_OS_NOT, audit_message);
}
}
else
{
flag = 0;
if (rpm_check(release:"RHEL4", reference:"evolution28-pango-1.14.9-13.el4_10")) flag++;
if (rpm_check(release:"RHEL4", reference:"evolution28-pango-devel-1.14.9-13.el4_10")) flag++;
if (rpm_check(release:"RHEL5", reference:"pango-1.14.9-8.el5_6.2")) flag++;
if (rpm_check(release:"RHEL5", reference:"pango-devel-1.14.9-8.el5_6.2")) flag++;
if (rpm_check(release:"RHEL6", reference:"pango-1.28.1-3.el6_0.3")) flag++;
if (rpm_check(release:"RHEL6", reference:"pango-debuginfo-1.28.1-3.el6_0.3")) flag++;
if (rpm_check(release:"RHEL6", reference:"pango-devel-1.28.1-3.el6_0.3")) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get() + redhat_report_package_caveat()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "evolution28-pango / evolution28-pango-devel / pango / etc");
}
}
{"id": "REDHAT-RHSA-2011-0180.NASL", "bulletinFamily": "scanner", "title": "RHEL 4 / 5 / 6 : pango (RHSA-2011:0180)", "description": "Updated pango and evolution28-pango packages that fix one security\nissue are now available for Red Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nPango is a library used for the layout and rendering of\ninternationalized text.\n\nAn input sanitization flaw, leading to a heap-based buffer overflow,\nwas found in the way Pango displayed font files when using the\nFreeType font engine back end. If a user loaded a malformed font file\nwith an application that uses Pango, it could cause the application to\ncrash or, possibly, execute arbitrary code with the privileges of the\nuser running the application. (CVE-2011-0020)\n\nUsers of pango and evolution28-pango are advised to upgrade to these\nupdated packages, which contain a backported patch to resolve this\nissue. After installing the updated packages, you must restart your\nsystem or restart your X session for the update to take effect.", "published": "2011-01-28T00:00:00", "modified": "2011-01-28T00:00:00", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}, "href": "https://www.tenable.com/plugins/nessus/51811", "reporter": "This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://access.redhat.com/errata/RHSA-2011:0180", "https://access.redhat.com/security/cve/cve-2011-0020"], "cvelist": ["CVE-2011-0020"], "type": "nessus", "lastseen": "2021-01-17T13:08:48", "edition": 26, "viewCount": 8, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2011-0020"]}, {"type": "centos", "idList": ["CESA-2011:0180"]}, {"type": "redhat", "idList": ["RHSA-2011:0180"]}, {"type": "oraclelinux", "idList": ["ELSA-2011-0180"]}, {"type": "exploitdb", "idList": ["EDB-ID:35232"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:11403", "SECURITYVULNS:DOC:31682", "SECURITYVULNS:DOC:25618"]}, {"type": "nessus", "idList": ["CENTOS_RHSA-2011-0180.NASL", "UBUNTU_USN-1082-1.NASL", "ORACLELINUX_ELSA-2011-0180.NASL", "SUSE_11_2_LIBPANGO-1_0-0-110301.NASL", "SUSE_FIREFOX3-PANGO-7459.NASL", "SL_20110127_PANGO_ON_SL4_X.NASL", "SUSE_FIREFOX3-PANGO-7460.NASL", "SUSE_11_3_LIBPANGO-1_0-0-110301.NASL", "MANDRIVA_MDVSA-2011-020.NASL", "SUSE_11_PANGO-110301.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310880472", "OPENVAS:1361412562310122275", "OPENVAS:1361412562310121188", "OPENVAS:1361412562310881404", "OPENVAS:1361412562310870385", "OPENVAS:870385", "OPENVAS:1361412562310840602", "OPENVAS:880472", "OPENVAS:881404", "OPENVAS:840602"]}, {"type": "ubuntu", "idList": ["USN-1082-1"]}, {"type": "gentoo", "idList": ["GLSA-201405-13"]}], "modified": "2021-01-17T13:08:48", "rev": 2}, "score": {"value": 6.8, "vector": "NONE", "modified": "2021-01-17T13:08:48", "rev": 2}, "vulnersScore": 6.8}, "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2011:0180. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51811);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2011-0020\");\n script_bugtraq_id(45842);\n script_xref(name:\"RHSA\", value:\"2011:0180\");\n\n script_name(english:\"RHEL 4 / 5 / 6 : pango (RHSA-2011:0180)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated pango and evolution28-pango packages that fix one security\nissue are now available for Red Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nPango is a library used for the layout and rendering of\ninternationalized text.\n\nAn input sanitization flaw, leading to a heap-based buffer overflow,\nwas found in the way Pango displayed font files when using the\nFreeType font engine back end. If a user loaded a malformed font file\nwith an application that uses Pango, it could cause the application to\ncrash or, possibly, execute arbitrary code with the privileges of the\nuser running the application. (CVE-2011-0020)\n\nUsers of pango and evolution28-pango are advised to upgrade to these\nupdated packages, which contain a backported patch to resolve this\nissue. After installing the updated packages, you must restart your\nsystem or restart your X session for the update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2011-0020\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2011:0180\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:evolution28-pango\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:evolution28-pango-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pango\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pango-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pango-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4.8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/01/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/01/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/01/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(4|5|6)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 4.x / 5.x / 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2011:0180\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL4\", reference:\"evolution28-pango-1.14.9-13.el4_10\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"evolution28-pango-devel-1.14.9-13.el4_10\")) flag++;\n\n\n if (rpm_check(release:\"RHEL5\", reference:\"pango-1.14.9-8.el5_6.2\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", reference:\"pango-devel-1.14.9-8.el5_6.2\")) flag++;\n\n\n if (rpm_check(release:\"RHEL6\", reference:\"pango-1.28.1-3.el6_0.3\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"pango-debuginfo-1.28.1-3.el6_0.3\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"pango-devel-1.28.1-3.el6_0.3\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"evolution28-pango / evolution28-pango-devel / pango / etc\");\n }\n}\n", "naslFamily": "Red Hat Local Security Checks", "pluginID": "51811", "cpe": ["cpe:/o:redhat:enterprise_linux:4", "cpe:/o:redhat:enterprise_linux:5", "p-cpe:/a:redhat:enterprise_linux:pango", "p-cpe:/a:redhat:enterprise_linux:evolution28-pango-devel", "cpe:/o:redhat:enterprise_linux:4.8", "cpe:/o:redhat:enterprise_linux:5.6", "p-cpe:/a:redhat:enterprise_linux:pango-devel", "p-cpe:/a:redhat:enterprise_linux:evolution28-pango", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:6.0", "p-cpe:/a:redhat:enterprise_linux:pango-debuginfo"], "scheme": null}
{"cve": [{"lastseen": "2020-12-09T19:39:02", "description": "Heap-based buffer overflow in the pango_ft2_font_render_box_glyph function in pango/pangoft2-render.c in libpango in Pango 1.28.3 and earlier, when the FreeType2 backend is enabled, allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file, related to the glyph box for an FT_Bitmap object.", "edition": 5, "cvss3": {}, "published": "2011-01-24T18:00:00", "title": "CVE-2011-0020", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-0020"], "modified": "2017-08-17T01:33:00", "cpe": ["cpe:/a:pango:pango:0.26", "cpe:/a:pango:pango:0.23", "cpe:/a:pango:pango:1.6", "cpe:/a:pango:pango:1.11", "cpe:/a:pango:pango:1.5", "cpe:/a:pango:pango:1.20", "cpe:/a:pango:pango:1.14", "cpe:/a:pango:pango:1.9", "cpe:/a:pango:pango:1.25", "cpe:/a:pango:pango:1.22", "cpe:/a:pango:pango:1.2", "cpe:/a:pango:pango:1.7", "cpe:/a:pango:pango:1.28.2", "cpe:/a:pango:pango:1.0", "cpe:/a:pango:pango:0.24", "cpe:/a:pango:pango:1.23", "cpe:/a:pango:pango:1.4", "cpe:/a:pango:pango:1.28.1", "cpe:/a:pango:pango:1.28.0", "cpe:/a:pango:pango:0.20", "cpe:/a:pango:pango:1.8", "cpe:/a:pango:pango:0.22", "cpe:/a:pango:pango:0.25", "cpe:/a:pango:pango:1.27", "cpe:/a:pango:pango:1.15", "cpe:/a:pango:pango:1.18", "cpe:/a:pango:pango:1.12", "cpe:/a:pango:pango:1.13", "cpe:/a:pango:pango:1.1", "cpe:/a:pango:pango:0.21", "cpe:/a:pango:pango:1.10", "cpe:/a:pango:pango:1.16", "cpe:/a:pango:pango:1.26", "cpe:/a:pango:pango:1.19", "cpe:/a:pango:pango:1.28.3", "cpe:/a:pango:pango:1.21", "cpe:/a:pango:pango:1.24", "cpe:/a:pango:pango:1.17", "cpe:/a:pango:pango:1.3"], "id": "CVE-2011-0020", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-0020", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:pango:pango:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.20:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.10:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:0.23:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:0.21:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.15:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.24:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.18:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:0.24:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.28.2:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.11:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.25:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.27:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.17:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.26:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:0.26:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.7:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.23:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:0.22:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:0.25:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.28.1:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.22:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.19:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.9:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.12:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.28.0:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.13:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.28.3:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.21:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.16:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:0.20:*:*:*:*:*:*:*", "cpe:2.3:a:pango:pango:1.14:*:*:*:*:*:*:*"]}], "centos": [{"lastseen": "2019-12-20T18:27:17", "bulletinFamily": "unix", "cvelist": ["CVE-2011-0020"], "description": "**CentOS Errata and Security Advisory** CESA-2011:0180\n\n\nPango is a library used for the layout and rendering of internationalized\ntext.\n\nAn input sanitization flaw, leading to a heap-based buffer overflow, was\nfound in the way Pango displayed font files when using the FreeType font\nengine back end. If a user loaded a malformed font file with an application\nthat uses Pango, it could cause the application to crash or, possibly,\nexecute arbitrary code with the privileges of the user running the\napplication. (CVE-2011-0020)\n\nUsers of pango and evolution28-pango are advised to upgrade to these\nupdated packages, which contain a backported patch to resolve this issue.\nAfter installing the updated packages, you must restart your system or\nrestart your X session for the update to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2011-February/029287.html\nhttp://lists.centos.org/pipermail/centos-announce/2011-February/029288.html\n\n**Affected packages:**\nevolution28-pango\nevolution28-pango-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2011-0180.html", "edition": 3, "modified": "2011-02-04T10:46:08", "published": "2011-02-04T10:45:23", "href": "http://lists.centos.org/pipermail/centos-announce/2011-February/029287.html", "id": "CESA-2011:0180", "title": "evolution28 security update", "type": "centos", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}], "redhat": [{"lastseen": "2019-08-13T18:45:11", "bulletinFamily": "unix", "cvelist": ["CVE-2011-0020"], "description": "Pango is a library used for the layout and rendering of internationalized\ntext.\n\nAn input sanitization flaw, leading to a heap-based buffer overflow, was\nfound in the way Pango displayed font files when using the FreeType font\nengine back end. If a user loaded a malformed font file with an application\nthat uses Pango, it could cause the application to crash or, possibly,\nexecute arbitrary code with the privileges of the user running the\napplication. (CVE-2011-0020)\n\nUsers of pango and evolution28-pango are advised to upgrade to these\nupdated packages, which contain a backported patch to resolve this issue.\nAfter installing the updated packages, you must restart your system or\nrestart your X session for the update to take effect.\n", "modified": "2018-06-06T20:24:17", "published": "2011-01-27T05:00:00", "id": "RHSA-2011:0180", "href": "https://access.redhat.com/errata/RHSA-2011:0180", "type": "redhat", "title": "(RHSA-2011:0180) Moderate: pango security update", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:39:10", "bulletinFamily": "unix", "cvelist": ["CVE-2011-0020"], "description": "[1.28.1-3.el6_0.3]\r\n- Fix a division by zero found in testing\r\n \n[1.28.1-3.el6_0.2]\r\n- Use -fno-strict-aliasing for C++, too\r\n- Escape macros in %changelog\r\n \n[1.28.1-3.el6_0.1]\r\n- Prevent heap corruption with malformed fonts. (CVE-2011-0020)\r\n- Resolves: #671529", "edition": 4, "modified": "2011-01-27T00:00:00", "published": "2011-01-27T00:00:00", "id": "ELSA-2011-0180", "href": "http://linux.oracle.com/errata/ELSA-2011-0180.html", "title": "pango security update", "type": "oraclelinux", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}], "exploitdb": [{"lastseen": "2016-02-04T00:52:51", "description": "Pango Font Parsing 'pangoft2-render.c' Heap Corruption Vulnerability. CVE-2011-0020. Remote exploit for linux platform", "published": "2011-01-18T00:00:00", "type": "exploitdb", "title": "Pango Font Parsing 'pangoft2-render.c' Heap Corruption Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2011-0020"], "modified": "2011-01-18T00:00:00", "id": "EDB-ID:35232", "href": "https://www.exploit-db.com/exploits/35232/", "sourceData": "source: http://www.securityfocus.com/bid/45842/info\r\n\r\nPango is prone to a remote heap-corruption vulnerability.\r\n\r\nAn attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.\r\n\r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/35232.zip\r\n", "cvss": {"score": 7.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://www.exploit-db.com/download/35232/"}], "securityvulns": [{"lastseen": "2018-08-31T11:10:38", "bulletinFamily": "software", "cvelist": ["CVE-2011-0020"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n\r\n Mandriva Linux Security Advisory MDVSA-2011:020\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n\r\n Package : pango\r\n Date : February 3, 2011\r\n Affected: 2009.0, 2010.0, 2010.1, Enterprise Server 5.0\r\n _______________________________________________________________________\r\n\r\n Problem Description:\r\n\r\n A vulnerability has been found and corrected in pango:\r\n \r\n Heap-based buffer overflow in the pango_ft2_font_render_box_glyph\r\n function in pango/pangoft2-render.c in libpango in Pango 1.28.3 and\r\n earlier, when the FreeType2 backend is enabled, allows user-assisted\r\n remote attackers to cause a denial of service (application crash)\r\n or possibly execute arbitrary code via a crafted font file, related\r\n to the glyph box for an FT_Bitmap object (CVE-2011-0020).\r\n \r\n Packages for 2009.0 are provided as of the Extended Maintenance\r\n Program. Please visit this link to learn more:\r\n http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490\r\n \r\n The updated packages have been patched to correct this issue.\r\n _______________________________________________________________________\r\n\r\n References:\r\n\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0020\r\n _______________________________________________________________________\r\n\r\n Updated Packages:\r\n\r\n Mandriva Linux 2009.0:\r\n 3db899ee2110f39b1ccd450e843c5ea7 2009.0/i586/libpango1.0_0-1.22.0-1.3mdv2009.0.i586.rpm\r\n 657942516e020b16eeae32f3dc836baa 2009.0/i586/libpango1.0_0-modules-1.22.0-1.3mdv2009.0.i586.rpm\r\n a0d719bc484d596463584df98f8409bb 2009.0/i586/libpango1.0-devel-1.22.0-1.3mdv2009.0.i586.rpm\r\n dc1c8c09bad4ae804e1bb2ce4742bef5 2009.0/i586/pango-1.22.0-1.3mdv2009.0.i586.rpm\r\n d813fc06f5c2b0bb8603195e9b15eb44 2009.0/i586/pango-doc-1.22.0-1.3mdv2009.0.i586.rpm \r\n cf41ce5c54a19123fa00b9e5a7bf337c 2009.0/SRPMS/pango-1.22.0-1.3mdv2009.0.src.rpm\r\n\r\n Mandriva Linux 2009.0/X86_64:\r\n c3ecff33fccaf66946ba903618e8fe80 2009.0/x86_64/lib64pango1.0_0-1.22.0-1.3mdv2009.0.x86_64.rpm\r\n 625b9c358058a66126b7bc8b6f470542 2009.0/x86_64/lib64pango1.0_0-modules-1.22.0-1.3mdv2009.0.x86_64.rpm\r\n 6bd9614af885e259e8c7a5cabed52c2e 2009.0/x86_64/lib64pango1.0-devel-1.22.0-1.3mdv2009.0.x86_64.rpm\r\n f7ac71ef96b15763d7811a62268ce474 2009.0/x86_64/pango-1.22.0-1.3mdv2009.0.x86_64.rpm\r\n 88aeba0d580db27b55ea5c341a009a9c 2009.0/x86_64/pango-doc-1.22.0-1.3mdv2009.0.x86_64.rpm \r\n cf41ce5c54a19123fa00b9e5a7bf337c 2009.0/SRPMS/pango-1.22.0-1.3mdv2009.0.src.rpm\r\n\r\n Mandriva Linux 2010.0:\r\n 0f31c217fcce79812382aa0afe596ebb 2010.0/i586/libpango1.0_0-1.26.1-1.3mdv2010.0.i586.rpm\r\n 850331d36fa05429ea3093ca5a7169c7 2010.0/i586/libpango1.0_0-modules-1.26.1-1.3mdv2010.0.i586.rpm\r\n 60784c0f7bf71e5d705ced8a3aa69c2d 2010.0/i586/libpango1.0-devel-1.26.1-1.3mdv2010.0.i586.rpm\r\n 0eabd2c0ae48b8fd231d2fb98ff59438 2010.0/i586/pango-1.26.1-1.3mdv2010.0.i586.rpm\r\n c6c2b7163064cfaadae3273717950363 2010.0/i586/pango-doc-1.26.1-1.3mdv2010.0.i586.rpm \r\n 7ff8d19db483746b5f2358c2329f8c27 2010.0/SRPMS/pango-1.26.1-1.3mdv2010.0.src.rpm\r\n\r\n Mandriva Linux 2010.0/X86_64:\r\n 924e4f26e516b281ca13cc17da4921ea 2010.0/x86_64/lib64pango1.0_0-1.26.1-1.3mdv2010.0.x86_64.rpm\r\n cddbc1115fc480a080fcfd3d21b72896 2010.0/x86_64/lib64pango1.0_0-modules-1.26.1-1.3mdv2010.0.x86_64.rpm\r\n 61e116217d6fa6a53d770089fab658b7 2010.0/x86_64/lib64pango1.0-devel-1.26.1-1.3mdv2010.0.x86_64.rpm\r\n 488126e666f5d9d88168dc103d1f920b 2010.0/x86_64/pango-1.26.1-1.3mdv2010.0.x86_64.rpm\r\n 1e62fa8f1c3b6de475590b3531b912d5 2010.0/x86_64/pango-doc-1.26.1-1.3mdv2010.0.x86_64.rpm \r\n 7ff8d19db483746b5f2358c2329f8c27 2010.0/SRPMS/pango-1.26.1-1.3mdv2010.0.src.rpm\r\n\r\n Mandriva Linux 2010.1:\r\n 6f08e84feda6c34cd0a69695633e9445 2010.1/i586/libpango1.0_0-1.28.0-1.1mdv2010.2.i586.rpm\r\n 090cf906caf8467730bbdc7579ff7411 2010.1/i586/libpango1.0_0-modules-1.28.0-1.1mdv2010.2.i586.rpm\r\n 025d3f6f48d1203680df92f04090986f 2010.1/i586/libpango1.0-devel-1.28.0-1.1mdv2010.2.i586.rpm\r\n 9138b7aa1dc8bebe0031443591491828 2010.1/i586/pango-1.28.0-1.1mdv2010.2.i586.rpm\r\n 82f6878b205ad3deb282150be602b7db 2010.1/i586/pango-doc-1.28.0-1.1mdv2010.2.i586.rpm \r\n 5c6a367bba096087944a8ef4eac4f742 2010.1/SRPMS/pango-1.28.0-1.1mdv2010.2.src.rpm\r\n\r\n Mandriva Linux 2010.1/X86_64:\r\n 8948263486380665fb3cbf190bdb456c 2010.1/x86_64/lib64pango1.0_0-1.28.0-1.1mdv2010.2.x86_64.rpm\r\n a60afb49286243817dc5e811323fcc7a 2010.1/x86_64/lib64pango1.0_0-modules-1.28.0-1.1mdv2010.2.x86_64.rpm\r\n 4c53ea354ee601e23e2b0ac3f1bf4022 2010.1/x86_64/lib64pango1.0-devel-1.28.0-1.1mdv2010.2.x86_64.rpm\r\n 99ef9646fb2ffdf433ddd4b0c14f7d29 2010.1/x86_64/pango-1.28.0-1.1mdv2010.2.x86_64.rpm\r\n 3dfe10e1ebf51061ff790a0abc991da5 2010.1/x86_64/pango-doc-1.28.0-1.1mdv2010.2.x86_64.rpm \r\n 5c6a367bba096087944a8ef4eac4f742 2010.1/SRPMS/pango-1.28.0-1.1mdv2010.2.src.rpm\r\n\r\n Mandriva Enterprise Server 5:\r\n 014efbcb7191ffc73672a84103fea5d1 mes5/i586/libpango1.0_0-1.22.0-1.3mdvmes5.1.i586.rpm\r\n f5b2a2e2b78f8c60f67c2c57eede1aca mes5/i586/libpango1.0_0-modules-1.22.0-1.3mdvmes5.1.i586.rpm\r\n e643d888e22e5cddbb9f4842a0656165 mes5/i586/libpango1.0-devel-1.22.0-1.3mdvmes5.1.i586.rpm\r\n 6f2b61d55cfd7e8bff5b123cae7a18c1 mes5/i586/pango-1.22.0-1.3mdvmes5.1.i586.rpm\r\n d31917c58c0da3c5c57770495b60b8d3 mes5/i586/pango-doc-1.22.0-1.3mdvmes5.1.i586.rpm \r\n 2a5aa3359ff9262f8e9fd16b0889f57f mes5/SRPMS/pango-1.22.0-1.3mdvmes5.1.src.rpm\r\n\r\n Mandriva Enterprise Server 5/X86_64:\r\n 2fffc8b9fb201a0a1d7eba51bbaacff3 mes5/x86_64/lib64pango1.0_0-1.22.0-1.3mdvmes5.1.x86_64.rpm\r\n efa9038f2fcec442489c4152250165d2 mes5/x86_64/lib64pango1.0_0-modules-1.22.0-1.3mdvmes5.1.x86_64.rpm\r\n 1d819ba1901668c46158b8c4f5c1442b mes5/x86_64/lib64pango1.0-devel-1.22.0-1.3mdvmes5.1.x86_64.rpm\r\n 8e8de0cdc3893add91b846b10c1170b7 mes5/x86_64/pango-1.22.0-1.3mdvmes5.1.x86_64.rpm\r\n 3f9aa790337dcec22666b1271dcb723d mes5/x86_64/pango-doc-1.22.0-1.3mdvmes5.1.x86_64.rpm \r\n 2a5aa3359ff9262f8e9fd16b0889f57f mes5/SRPMS/pango-1.22.0-1.3mdvmes5.1.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.9 (GNU/Linux)\r\n\r\niD8DBQFNStlimqjQ0CJFipgRAuO3AJwPc4SpZKjKJddhZ1YggwBkGws2fwCgk4vp\r\nbn5ujBdcxa+nA3WYTbHiOMU=\r\n=8Y+o\r\n-----END PGP SIGNATURE-----\r\n", "edition": 1, "modified": "2011-02-04T00:00:00", "published": "2011-02-04T00:00:00", "id": "SECURITYVULNS:DOC:25618", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:25618", "title": "[ MDVSA-2011:020 ] pango", "type": "securityvulns", "cvss": {"score": 7.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:40", "bulletinFamily": "software", "cvelist": ["CVE-2011-0020"], "description": "Buffer overflow in pango_ft2_font_render_box_glyph()", "edition": 1, "modified": "2011-02-04T00:00:00", "published": "2011-02-04T00:00:00", "id": "SECURITYVULNS:VULN:11403", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:11403", "title": "pango / libpango buffer overflow", "type": "securityvulns", "cvss": {"score": 7.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:57", "bulletinFamily": "software", "cvelist": ["CVE-2013-2635", "CVE-2014-1536", "CVE-2013-1797", "CVE-2014-4208", "CVE-2014-3508", "CVE-2014-4262", "CVE-2014-3566", "CVE-2014-2397", "CVE-2014-2490", "CVE-2013-1767", "CVE-2015-0512", "CVE-2012-6548", "CVE-2014-4263", "CVE-2014-0457", "CVE-2014-0455", "CVE-2014-0446", "CVE-2013-0268", "CVE-2013-0160", "CVE-2014-3613", "CVE-2014-4218", "CVE-2013-1848", "CVE-2014-1538", "CVE-2014-4221", "CVE-2014-2420", "CVE-2013-2005", "CVE-2014-3638", "CVE-2014-0458", "CVE-2014-2427", "CVE-2014-3507", "CVE-2013-1860", "CVE-2014-4268", "CVE-2014-1537", "CVE-2014-2413", "CVE-2014-0076", "CVE-2014-4265", "CVE-2014-3513", "CVE-2013-1792", "CVE-2013-4242", "CVE-2014-0454", "CVE-2014-0224", "CVE-2014-0453", "CVE-2014-0432", "CVE-2014-4266", "CVE-2012-2137", "CVE-2014-0461", "CVE-2014-3511", "CVE-2011-3389", "CVE-2014-0459", "CVE-2014-0456", "CVE-2014-4244", "CVE-2013-1772", "CVE-2014-1534", "CVE-2013-0349", "CVE-2014-0429", "CVE-2013-1774", "CVE-2014-0463", "CVE-2014-3470", "CVE-2014-3506", "CVE-2014-1545", "CVE-2013-0311", "CVE-2014-4209", "CVE-2014-0464", "CVE-2014-0139", "CVE-2014-0092", "CVE-2014-2403", "CVE-2011-0020", "CVE-2010-5107", "CVE-2014-0449", "CVE-2014-2412", "CVE-2014-2428", "CVE-2010-5298", "CVE-2013-0231", "CVE-2014-2421", "CVE-2014-0460", "CVE-2014-0448", "CVE-2014-0195", "CVE-2014-0198", "CVE-2014-4216", "CVE-2014-2401", "CVE-2014-3567", "CVE-2014-0015", "CVE-2014-3620", "CVE-2013-0913", "CVE-2014-4264", "CVE-2014-2422", "CVE-2014-4330", "CVE-2014-4220", "CVE-2012-6085", "CVE-2014-3512", "CVE-2013-2002", "CVE-2013-1901", "CVE-2014-3510", "CVE-2012-6549", "CVE-2014-2423", "CVE-2014-1541", "CVE-2014-2410", "CVE-2013-1902", "CVE-2013-0914", "CVE-2014-2483", "CVE-2013-2634", "CVE-2012-5885", "CVE-2014-3568", "CVE-2014-1533", "CVE-2014-4227", "CVE-2014-2409", "CVE-2014-4247", "CVE-2013-0216", "CVE-2014-4252", "CVE-2013-1796", "CVE-2014-0138", "CVE-2014-4219", "CVE-2013-1798", "CVE-2013-1900", "CVE-2014-2398", "CVE-2014-0451", "CVE-2014-0452", "CVE-2014-3509", "CVE-2014-5139", "CVE-2014-2414", "CVE-2014-4223", "CVE-2011-0064", "CVE-2013-1899", "CVE-2014-3639", "CVE-2014-0221", "CVE-2014-2402"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\nESA-2015-002: Unisphere Central Security Update for Multiple Vulnerabilities\r\n\r\nEMC Identifier: ESA-2015-002\r\n \t\r\nCVE Identifier: CVE-2013-1899, CVE-2013-1900, CVE-2013-1901, CVE-2013-1902, CVE-2012-5885, CVE-2011-3389, CVE-2013-1767, CVE-2012-2137, CVE-2012-6548, CVE-2013-1797, CVE-2013-0231, CVE-2013-1774, CVE-2013-1848, CVE-2013-0311, CVE-2013-2634, CVE-2013-0268, CVE-2013-0913,CVE-2013-1772, CVE-2013-0216, CVE-2013-1792, CVE-2012-6549, CVE-2013-2635, CVE-2013-0914, CVE-2013-1796, CVE-2013-0160, CVE-2013-1860, CVE-2013-0349, CVE-2013-1798, CVE-2013-4242, CVE-2014-0138, CVE-2014-0139, CVE-2010-5298, CVE-2014-0076, CVE-2014-0195, CVE-2014-0198, CVE-2014-0221, CVE-2014-0224, CVE-2014-3470, CVE-2014-3506, CVE-2014-3507, CVE-2014-3508, CVE-2014-3509, CVE-2014-3510, CVE-2014-3511, CVE-2014-3512, CVE-2014-5139, CVE-2012-6085, CVE-2014-2403, CVE-2014-0446, CVE-2014-0457, CVE-2014-0453, CVE-2014-2412, CVE-2014-2398, CVE-2014-0458, CVE-2014-2397, CVE-2014-0460, CVE-2014-0429, CVE-2014-2428, CVE-2014-2423, CVE-2014-2420, CVE-2014-0448, CVE-2014-0459, CVE-2014-2427, CVE-2014-2414, CVE-2014-0461, CVE-2014-0454, CVE-2014-2422, CVE-2014-0464, CVE-2014-2401, CVE-2014-0456, CVE-2014-0455, CVE-2014-0451, CVE-2014-0449, CVE-2014-0432, CVE-2014-0463, CVE-2014-2410 , CVE-2014-2413, CVE-2014-2421, CVE-2014-2409, CVE-2014-2402, CVE-2014-0452, CVE-2010-5107, CVE-2014-1545, CVE-2014-1541, CVE-2014-1534, CVE-2014-1533, CVE-2014-1536, CVE-2014-1537, CVE-2014-1538, CVE-2013-2005, CVE-2013-2002, CVE-2014-0092, CVE-2014-0015, CVE-2014-4220, CVE-2014-2490, CVE-2014-4266, CVE-2014-4219, CVE-2014-2483, CVE-2014-4263, CVE-2014-4264, CVE-2014-4268, CVE-2014-4252, CVE-2014-4223, CVE-2014-4247, CVE-2014-4218, CVE-2014-4221, CVE-2014-4262, CVE-2014-4227, CVE-2014-4208, CVE-2014-4209, CVE-2014-4265, CVE-2014-4244,\r\nCVE-2014-4216, CVE-2011-0020, CVE-2011-0064, CVE-2014-3638, CVE-2014-3639, CVE-2014-3513, CVE-2014-3567, CVE-2014-3568, CVE-2014-3566, CVE-2014-4330, CVE-2014-3613, CVE-2014-3620, CVE-2015-0512\r\n\r\nSeverity Rating: View details below for CVSSv2 scores\r\n\r\nAffected products: \r\nUnisphere Central versions prior to 4.0\r\n\r\nSummary: \r\nUnisphere Central requires an update to address various security vulnerabilities that could potentially be exploited by malicious users to compromise the affected system.\r\n\r\nDetails: \r\nUnisphere Central requires an update to address various security vulnerabilities:\r\n\r\n1.\tUnvalidated Redirect Vulnerability (CVE-2015-0512)\r\n\r\nA potential vulnerability in Unisphere Central may allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks. The attacker can specify the location of the arbitrary site in the unvalidated parameter of a crafted URL. If this URL is accessed, the browser is redirected to the arbitrary site specified in the parameter.\r\n\r\nCVSSv2 Base Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)\r\n\r\n2.\tMultiple Embedded Component Vulnerabilities\r\n\r\nThe following vulnerabilities affecting multiple embedded components were addressed:\r\n\r\n\u2022\tPostgreSQL (CVE-2013-1899, CVE-2013-1900, CVE-2013-1901, CVE-2013-1902)\r\n\u2022\tApache Tomcat HTTP Digest Access Bypass (CVE-2012-5885)\r\n\u2022\tSSL3.0/TLS1.0 Weak CBC Mode Vulnerability (CVE-2011-3389)\r\n\u2022\tSUSE Kernel Updates (CVE-2013-1767, CVE-2012-2137, CVE-2012-6548, CVE-2013-1797, CVE-2013-0231,CVE-2013-1774, CVE-2013-1848, CVE-2013-0311, CVE-2013-2634, CVE-2013-0268, CVE-2013-0913, CVE-2013-1772, CVE-2013-0216, CVE-2013-1792, CVE-2012-6549, CVE-2013-2635, CVE-2013-0914, CVE-2013-1796, CVE-2013-0160, CVE-2013-1860, CVE-2013-0349, CVE-2013-1798)\r\n\u2022\tLibgcrypt (CVE-2013-4242)\r\n\u2022\tcURL/libcURL Multiple Vulnerabilities (CVE-2014-0138, CVE-2014-0139, CVE-2014-0015, CVE-2014-3613, CVE-2014-3620)\r\n\u2022\tOpenSSL Multiple Vulnerabilities (CVE-2010-5298, CVE-2014-0076, CVE-2014-0195, CVE-2014-0198, CVE-2014-0221, CVE-2014-0224, CVE-2014-3470, CVE-2014-3506, CVE-2014-3507, CVE-2014-3508, CVE-2014-3509, CVE-2014-3510, CVE-2014-3511, CVE-2014-3512, CVE-2014-5139, CVE-2014-3513, CVE-2014-3567, CVE-2014-3568, CVE-2014-3566)\r\n\u2022\tGNU Privacy Guard (GPG2) Update (CVE-2012-6085)\r\n\u2022\tJava Runtime Environment (CVE-2014-2403, CVE-2014-0446, CVE-2014-0457, CVE-2014-0453, CVE-2014-2412, CVE-2014-2398, CVE-2014-0458, CVE-2014-2397, CVE-2014-0460, CVE-2014-0429, CVE-2014-2428, CVE-2014-2423, CVE-2014-2420, CVE-2014-0448, CVE-2014-0459, CVE-2014-2427, CVE-2014-2414, CVE-2014-0461, CVE-2014-0454, CVE-2014-2422, CVE-2014-0464, CVE-2014-2401, CVE-2014-0456, CVE-2014-0455, CVE-2014-0451, CVE-2014-0449, CVE-2014-0432, CVE-2014-0463, CVE-2014-2410, CVE-2014-2413, CVE-2014-2421, CVE-2014-2409, CVE-2014-2402, CVE-2014-0452, CVE-2014-4220, CVE-2014-2490, CVE-2014-4266, CVE-2014-4219, CVE-2014-2483, CVE-2014-4263, CVE-2014-4264, CVE-2014-4268, CVE-2014-4252, CVE-2014-4223, CVE-2014-4247, CVE-2014-4218, CVE-2014-4221, CVE-2014-4262, CVE-2014-4227, CVE-2014-4208, CVE-2014-4209, CVE-2014-4265, CVE-2014-4244, CVE-2014-4216)\r\n\u2022\tOpenSSH Denial of Service (CVE-2010-5107)\r\n\u2022\tNetwork Security Services (NSS) Update (CVE-2014-1545, CVE-2014-1541, CVE-2014-1534, CVE-2014-1533, CVE-2014-1536, CVE-2014-1537, CVE-2014-1538)\r\n\u2022\t Xorg-X11 Update (CVE-2013-2005, CVE-2013-2002)\r\n\u2022\tGnuTLS SSL Verification Vulnerability (CVE-2014-0092)\r\n\u2022\tPango Security Update (CVE-2011-0020, CVE-2011-0064)\r\n\u2022\tD-Bus Denial of Service (CVE-2014-3638,CVE-2014-3639)\r\n\u2022\tPerl Denial of Service (CVE-2014-4330)\r\nCVSSv2 Base Score: Refer to NVD (http://nvd.nist.gov) for individual scores for each CVE listed above\r\n\r\nFor more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here, consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm. To search for a particular CVE, use the NVD database\u2019s search utility at http://web.nvd.nist.gov/view/vuln/search\r\n\r\nResolution: \r\nThe following Unisphere Central release contains resolutions to the above issues:\r\n\u2022\tUnisphere Central version 4.0.\r\n\r\nEMC strongly recommends all customers upgrade at the earliest opportunity. Contact EMC Unisphere Central customer support to download the required upgrades. \r\n\r\nLink to remedies:\r\nRegistered EMC Online Support customers can download patches and software from support.emc.com at: https://support.emc.com/products/28224_Unisphere-Central\r\n\r\n\r\nIf you have any questions, please contact EMC Support.\r\n\r\nRead and use the information in this EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact EMC Software Technical Support at 1-877-534-2867. \r\n\r\n\r\nFor an explanation of Severity Ratings, refer to EMC Knowledgebase solution emc218831. EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. EMC Corporation distributes EMC Security Advisories, in order to bring to the attention of users of the affected EMC products, important security information. EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.\r\n\r\nEMC Product Security Response Center\r\nsecurity_alert@emc.com\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.13 (Cygwin)\r\n\r\niEYEARECAAYFAlTKSaIACgkQtjd2rKp+ALzINgCg01qlCrN0carogi8MwnbjGNrP\r\n6oIAnRiS6bIIqnGmGN0c+ayX74Qad4vY\r\n=5UIE\r\n-----END PGP SIGNATURE-----\r\n", "edition": 1, "modified": "2015-02-02T00:00:00", "published": "2015-02-02T00:00:00", "id": "SECURITYVULNS:DOC:31682", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:31682", "title": "ESA-2015-002: Unisphere Central Security Update for Multiple Vulnerabilities", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2021-01-07T11:53:05", "description": "A vulnerability has been found and corrected in pango :\n\nHeap-based buffer overflow in the pango_ft2_font_render_box_glyph\nfunction in pango/pangoft2-render.c in libpango in Pango 1.28.3 and\nearlier, when the FreeType2 backend is enabled, allows user-assisted\nremote attackers to cause a denial of service (application crash) or\npossibly execute arbitrary code via a crafted font file, related to\nthe glyph box for an FT_Bitmap object (CVE-2011-0020).\n\nPackages for 2009.0 are provided as of the Extended Maintenance\nProgram. Please visit this link to learn more:\nhttp://store.mandriva.com/product_info.php?cPath=149 products_id=490\n\nThe updated packages have been patched to correct this issue.", "edition": 24, "published": "2011-02-04T00:00:00", "title": "Mandriva Linux Security Advisory : pango (MDVSA-2011:020)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-0020"], "modified": "2011-02-04T00:00:00", "cpe": ["cpe:/o:mandriva:linux:2009.0", "p-cpe:/a:mandriva:linux:libpango1.0-devel", "p-cpe:/a:mandriva:linux:libpango1.0_0", "p-cpe:/a:mandriva:linux:lib64pango1.0_0-modules", "cpe:/o:mandriva:linux:2010.1", "cpe:/o:mandriva:linux:2010.0", "p-cpe:/a:mandriva:linux:lib64pango1.0-devel", "p-cpe:/a:mandriva:linux:lib64pango1.0_0", "p-cpe:/a:mandriva:linux:pango", "p-cpe:/a:mandriva:linux:pango-doc", "p-cpe:/a:mandriva:linux:libpango1.0_0-modules"], "id": "MANDRIVA_MDVSA-2011-020.NASL", "href": "https://www.tenable.com/plugins/nessus/51865", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2011:020. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51865);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2011-0020\");\n script_xref(name:\"MDVSA\", value:\"2011:020\");\n\n script_name(english:\"Mandriva Linux Security Advisory : pango (MDVSA-2011:020)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A vulnerability has been found and corrected in pango :\n\nHeap-based buffer overflow in the pango_ft2_font_render_box_glyph\nfunction in pango/pangoft2-render.c in libpango in Pango 1.28.3 and\nearlier, when the FreeType2 backend is enabled, allows user-assisted\nremote attackers to cause a denial of service (application crash) or\npossibly execute arbitrary code via a crafted font file, related to\nthe glyph box for an FT_Bitmap object (CVE-2011-0020).\n\nPackages for 2009.0 are provided as of the Extended Maintenance\nProgram. Please visit this link to learn more:\nhttp://store.mandriva.com/product_info.php?cPath=149 products_id=490\n\nThe updated packages have been patched to correct this issue.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64pango1.0-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64pango1.0_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64pango1.0_0-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libpango1.0-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libpango1.0_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libpango1.0_0-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:pango\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:pango-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2009.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2010.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2010.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/02/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/02/04\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64pango1.0-devel-1.22.0-1.3mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64pango1.0_0-1.22.0-1.3mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64pango1.0_0-modules-1.22.0-1.3mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libpango1.0-devel-1.22.0-1.3mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libpango1.0_0-1.22.0-1.3mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libpango1.0_0-modules-1.22.0-1.3mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"pango-1.22.0-1.3mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"pango-doc-1.22.0-1.3mdv2009.0\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64pango1.0-devel-1.26.1-1.3mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64pango1.0_0-1.26.1-1.3mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64pango1.0_0-modules-1.26.1-1.3mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libpango1.0-devel-1.26.1-1.3mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libpango1.0_0-1.26.1-1.3mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libpango1.0_0-modules-1.26.1-1.3mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"pango-1.26.1-1.3mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"pango-doc-1.26.1-1.3mdv2010.0\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64pango1.0-devel-1.28.0-1.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64pango1.0_0-1.28.0-1.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64pango1.0_0-modules-1.28.0-1.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libpango1.0-devel-1.28.0-1.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libpango1.0_0-1.28.0-1.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libpango1.0_0-modules-1.28.0-1.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"pango-1.28.0-1.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"pango-doc-1.28.0-1.1mdv2010.2\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T13:45:24", "description": "An input sanitization flaw, leading to a heap-based buffer overflow,\nwas found in the way Pango displayed font files when using the\nFreeType font engine back end. If a user loaded a malformed font file\nwith an application that uses Pango, it could cause the application to\ncrash or, possibly, execute arbitrary code with the privileges of the\nuser running the application. (CVE-2011-0020)\n\nAfter installing the updated packages, you must restart your system or\nrestart your X session for the update to take effect.", "edition": 24, "published": "2012-08-01T00:00:00", "title": "Scientific Linux Security Update : pango on SL4.x, SL5.x i386/x86_64", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-0020"], "modified": "2012-08-01T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20110127_PANGO_ON_SL4_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60944", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60944);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2011-0020\");\n\n script_name(english:\"Scientific Linux Security Update : pango on SL4.x, SL5.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An input sanitization flaw, leading to a heap-based buffer overflow,\nwas found in the way Pango displayed font files when using the\nFreeType font engine back end. If a user loaded a malformed font file\nwith an application that uses Pango, it could cause the application to\ncrash or, possibly, execute arbitrary code with the privileges of the\nuser running the application. (CVE-2011-0020)\n\nAfter installing the updated packages, you must restart your system or\nrestart your X session for the update to take effect.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1102&L=scientific-linux-errata&T=0&P=79\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?254672f9\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/01/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL4\", reference:\"evolution28-pango-1.14.9-13.el4_10\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"evolution28-pango-devel-1.14.9-13.el4_10\")) flag++;\n\nif (rpm_check(release:\"SL5\", reference:\"pango-1.14.9-8.el5_6.2\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"pango-devel-1.14.9-8.el5_6.2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-20T15:14:25", "description": "The following bug has been fixed :\n\n - Specially crafted font files could cause a heap\n corruption in applications linked against pango.\n (CVE-2011-0020)", "edition": 23, "published": "2011-05-23T00:00:00", "title": "SuSE 10 Security Update : firefox3-pango (ZYPP Patch Number 7460)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-0020"], "modified": "2011-05-23T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_FIREFOX3-PANGO-7460.NASL", "href": "https://www.tenable.com/plugins/nessus/54612", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(54612);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2011-0020\");\n\n script_name(english:\"SuSE 10 Security Update : firefox3-pango (ZYPP Patch Number 7460)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The following bug has been fixed :\n\n - Specially crafted font files could cause a heap\n corruption in applications linked against pango.\n (CVE-2011-0020)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2011-0020.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 7460.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/04/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/05/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLES10\", sp:3, reference:\"firefox3-pango-1.14.5-0.12.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:3, cpu:\"x86_64\", reference:\"firefox3-pango-32bit-1.14.5-0.12.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T12:45:38", "description": "From Red Hat Security Advisory 2011:0180 :\n\nUpdated pango and evolution28-pango packages that fix one security\nissue are now available for Red Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nPango is a library used for the layout and rendering of\ninternationalized text.\n\nAn input sanitization flaw, leading to a heap-based buffer overflow,\nwas found in the way Pango displayed font files when using the\nFreeType font engine back end. If a user loaded a malformed font file\nwith an application that uses Pango, it could cause the application to\ncrash or, possibly, execute arbitrary code with the privileges of the\nuser running the application. (CVE-2011-0020)\n\nUsers of pango and evolution28-pango are advised to upgrade to these\nupdated packages, which contain a backported patch to resolve this\nissue. After installing the updated packages, you must restart your\nsystem or restart your X session for the update to take effect.", "edition": 23, "published": "2013-07-12T00:00:00", "title": "Oracle Linux 4 / 5 / 6 : pango (ELSA-2011-0180)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-0020"], "modified": "2013-07-12T00:00:00", "cpe": ["cpe:/o:oracle:linux:6", "cpe:/o:oracle:linux:5", "p-cpe:/a:oracle:linux:evolution28-pango", "p-cpe:/a:oracle:linux:evolution28-pango-devel", "cpe:/o:oracle:linux:4", "p-cpe:/a:oracle:linux:pango", "p-cpe:/a:oracle:linux:pango-devel"], "id": "ORACLELINUX_ELSA-2011-0180.NASL", "href": "https://www.tenable.com/plugins/nessus/68188", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2011:0180 and \n# Oracle Linux Security Advisory ELSA-2011-0180 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(68188);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2011-0020\");\n script_bugtraq_id(45842);\n script_xref(name:\"RHSA\", value:\"2011:0180\");\n\n script_name(english:\"Oracle Linux 4 / 5 / 6 : pango (ELSA-2011-0180)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2011:0180 :\n\nUpdated pango and evolution28-pango packages that fix one security\nissue are now available for Red Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nPango is a library used for the layout and rendering of\ninternationalized text.\n\nAn input sanitization flaw, leading to a heap-based buffer overflow,\nwas found in the way Pango displayed font files when using the\nFreeType font engine back end. If a user loaded a malformed font file\nwith an application that uses Pango, it could cause the application to\ncrash or, possibly, execute arbitrary code with the privileges of the\nuser running the application. (CVE-2011-0020)\n\nUsers of pango and evolution28-pango are advised to upgrade to these\nupdated packages, which contain a backported patch to resolve this\nissue. After installing the updated packages, you must restart your\nsystem or restart your X session for the update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2011-February/001873.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2011-January/001805.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2011-January/001806.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected pango packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:evolution28-pango\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:evolution28-pango-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:pango\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:pango-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/01/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/02/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(4|5|6)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 4 / 5 / 6\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL4\", reference:\"evolution28-pango-1.14.9-13.el4_10\")) flag++;\nif (rpm_check(release:\"EL4\", reference:\"evolution28-pango-devel-1.14.9-13.el4_10\")) flag++;\n\nif (rpm_check(release:\"EL5\", reference:\"pango-1.14.9-8.0.1.el5_6.2\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"pango-devel-1.14.9-8.0.1.el5_6.2\")) flag++;\n\nif (rpm_check(release:\"EL6\", reference:\"pango-1.28.1-3.el6_0.3\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"pango-devel-1.28.1-3.el6_0.3\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"evolution28-pango / evolution28-pango-devel / pango / pango-devel\");\n}\n", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-20T15:14:25", "description": "The following bug has been fixed :\n\n - Specially crafted font files could cause a heap\n corruption in applications linked against pango.\n (CVE-2011-0020)", "edition": 23, "published": "2011-12-13T00:00:00", "title": "SuSE 10 Security Update : firefox3-pango (ZYPP Patch Number 7459)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-0020"], "modified": "2011-12-13T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_FIREFOX3-PANGO-7459.NASL", "href": "https://www.tenable.com/plugins/nessus/57187", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(57187);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2011-0020\");\n\n script_name(english:\"SuSE 10 Security Update : firefox3-pango (ZYPP Patch Number 7459)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The following bug has been fixed :\n\n - Specially crafted font files could cause a heap\n corruption in applications linked against pango.\n (CVE-2011-0020)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2011-0020.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 7459.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/04/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/12/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:4, reference:\"firefox3-pango-1.14.5-0.12.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:4, cpu:\"x86_64\", reference:\"firefox3-pango-32bit-1.14.5-0.12.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:4, reference:\"firefox3-pango-1.14.5-0.12.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:4, cpu:\"x86_64\", reference:\"firefox3-pango-32bit-1.14.5-0.12.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:26:51", "description": "Updated pango and evolution28-pango packages that fix one security\nissue are now available for Red Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nPango is a library used for the layout and rendering of\ninternationalized text.\n\nAn input sanitization flaw, leading to a heap-based buffer overflow,\nwas found in the way Pango displayed font files when using the\nFreeType font engine back end. If a user loaded a malformed font file\nwith an application that uses Pango, it could cause the application to\ncrash or, possibly, execute arbitrary code with the privileges of the\nuser running the application. (CVE-2011-0020)\n\nUsers of pango and evolution28-pango are advised to upgrade to these\nupdated packages, which contain a backported patch to resolve this\nissue. After installing the updated packages, you must restart your\nsystem or restart your X session for the update to take effect.", "edition": 25, "published": "2011-02-06T00:00:00", "title": "CentOS 4 : pango (CESA-2011:0180)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-0020"], "modified": "2011-02-06T00:00:00", "cpe": ["cpe:/o:centos:centos:4", "p-cpe:/a:centos:centos:evolution28-pango", "p-cpe:/a:centos:centos:evolution28-pango-devel"], "id": "CENTOS_RHSA-2011-0180.NASL", "href": "https://www.tenable.com/plugins/nessus/51886", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2011:0180 and \n# CentOS Errata and Security Advisory 2011:0180 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51886);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2011-0020\");\n script_bugtraq_id(45842);\n script_xref(name:\"RHSA\", value:\"2011:0180\");\n\n script_name(english:\"CentOS 4 : pango (CESA-2011:0180)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated pango and evolution28-pango packages that fix one security\nissue are now available for Red Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nPango is a library used for the layout and rendering of\ninternationalized text.\n\nAn input sanitization flaw, leading to a heap-based buffer overflow,\nwas found in the way Pango displayed font files when using the\nFreeType font engine back end. If a user loaded a malformed font file\nwith an application that uses Pango, it could cause the application to\ncrash or, possibly, execute arbitrary code with the privileges of the\nuser running the application. (CVE-2011-0020)\n\nUsers of pango and evolution28-pango are advised to upgrade to these\nupdated packages, which contain a backported patch to resolve this\nissue. After installing the updated packages, you must restart your\nsystem or restart your X session for the update to take effect.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2011-February/017249.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c58052cb\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2011-February/017250.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?36574f07\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected pango packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:evolution28-pango\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:evolution28-pango-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/01/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/02/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/02/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"evolution28-pango-1.14.9-13.el4_10\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"evolution28-pango-1.14.9-13.el4_10\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"evolution28-pango-devel-1.14.9-13.el4_10\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"evolution28-pango-devel-1.14.9-13.el4_10\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"evolution28-pango / evolution28-pango-devel\");\n}\n", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T14:06:07", "description": "Specially crafted font files could cause a heap corruption in\napplications linked against pango (CVE-2011-0064, CVE-2011-0020).", "edition": 25, "published": "2011-05-05T00:00:00", "title": "openSUSE Security Update : libpango-1_0-0 (openSUSE-SU-2011:0221-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-0020", "CVE-2011-0064"], "modified": "2011-05-05T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:pango-32bit", "p-cpe:/a:novell:opensuse:pango-devel", "cpe:/o:novell:opensuse:11.2", "p-cpe:/a:novell:opensuse:pango-module-thai-lang", "p-cpe:/a:novell:opensuse:pango"], "id": "SUSE_11_2_LIBPANGO-1_0-0-110301.NASL", "href": "https://www.tenable.com/plugins/nessus/53753", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update libpango-1_0-0-4076.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(53753);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2011-0020\", \"CVE-2011-0064\");\n\n script_name(english:\"openSUSE Security Update : libpango-1_0-0 (openSUSE-SU-2011:0221-1)\");\n script_summary(english:\"Check for the libpango-1_0-0-4076 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Specially crafted font files could cause a heap corruption in\napplications linked against pango (CVE-2011-0064, CVE-2011-0020).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=666101\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=672502\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2011-03/msg00019.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libpango-1_0-0 packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pango\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pango-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pango-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pango-module-thai-lang\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/03/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/05/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.2\", reference:\"pango-1.26.2-1.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"pango-devel-1.26.2-1.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"pango-module-thai-lang-1.26.2-1.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", cpu:\"x86_64\", reference:\"pango-32bit-1.26.2-1.3.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"pango / pango-32bit / pango-devel / pango-module-thai-lang\");\n}\n", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T14:07:42", "description": "Specially crafted font files could cause a heap corruption in\napplications linked against pango (CVE-2011-0064, CVE-2011-0020).", "edition": 25, "published": "2014-06-13T00:00:00", "title": "openSUSE Security Update : libpango-1_0-0 (openSUSE-SU-2011:0221-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-0020", "CVE-2011-0064"], "modified": "2014-06-13T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:pango-32bit", "p-cpe:/a:novell:opensuse:pango-devel", "p-cpe:/a:novell:opensuse:pango-module-thai-lang", "p-cpe:/a:novell:opensuse:pango", "cpe:/o:novell:opensuse:11.3"], "id": "SUSE_11_3_LIBPANGO-1_0-0-110301.NASL", "href": "https://www.tenable.com/plugins/nessus/75599", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update libpango-1_0-0-4076.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(75599);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2011-0020\", \"CVE-2011-0064\");\n\n script_name(english:\"openSUSE Security Update : libpango-1_0-0 (openSUSE-SU-2011:0221-1)\");\n script_summary(english:\"Check for the libpango-1_0-0-4076 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Specially crafted font files could cause a heap corruption in\napplications linked against pango (CVE-2011-0064, CVE-2011-0020).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=666101\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=672502\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2011-03/msg00019.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libpango-1_0-0 packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pango\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pango-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pango-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pango-module-thai-lang\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/03/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.3\", reference:\"pango-1.28.0-3.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"pango-devel-1.28.0-3.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"pango-module-thai-lang-1.28.0-3.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", cpu:\"x86_64\", reference:\"pango-32bit-1.28.0-3.3.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"pango / pango-32bit / pango-devel / pango-module-thai-lang\");\n}\n", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-20T14:41:47", "description": "Specially crafted font files could cause a heap corruption in\napplications linked against pango. (CVE-2011-0064 / CVE-2011-0020)", "edition": 23, "published": "2011-03-24T00:00:00", "title": "SuSE 11.1 Security Update : pango (SAT Patch Number 4065)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-0020", "CVE-2011-0064"], "modified": "2011-03-24T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:11:pango-devel", "p-cpe:/a:novell:suse_linux:11:pango-32bit", "p-cpe:/a:novell:suse_linux:11:pango", "cpe:/o:novell:suse_linux:11", "p-cpe:/a:novell:suse_linux:11:pango-doc"], "id": "SUSE_11_PANGO-110301.NASL", "href": "https://www.tenable.com/plugins/nessus/52960", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from SuSE 11 update information. The text itself is\n# copyright (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(52960);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2011-0020\", \"CVE-2011-0064\");\n\n script_name(english:\"SuSE 11.1 Security Update : pango (SAT Patch Number 4065)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 11 host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Specially crafted font files could cause a heap corruption in\napplications linked against pango. (CVE-2011-0064 / CVE-2011-0020)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=666101\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=672502\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2011-0020.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2011-0064.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply SAT patch number 4065.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:pango\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:pango-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:pango-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:pango-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/03/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/03/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)11\") audit(AUDIT_OS_NOT, \"SuSE 11\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SuSE 11\", cpu);\n\npl = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(pl) || int(pl) != 1) audit(AUDIT_OS_NOT, \"SuSE 11.1\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"i586\", reference:\"pango-1.26.2-1.3.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"i586\", reference:\"pango-devel-1.26.2-1.3.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"x86_64\", reference:\"pango-1.26.2-1.3.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"x86_64\", reference:\"pango-32bit-1.26.2-1.3.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"x86_64\", reference:\"pango-devel-1.26.2-1.3.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:1, reference:\"pango-1.26.2-1.3.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:1, reference:\"pango-doc-1.26.2-1.3.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:1, cpu:\"s390x\", reference:\"pango-32bit-1.26.2-1.3.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:1, cpu:\"x86_64\", reference:\"pango-32bit-1.26.2-1.3.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T06:34:31", "description": "Marc Schoenefeld discovered that Pango incorrectly handled certain\nGlyph Definition (GDEF) tables. If a user were tricked into displaying\ntext with a specially crafted font, an attacker could cause Pango to\ncrash, resulting in a denial of service. This issue only affected\nUbuntu 8.04 LTS and 9.10. (CVE-2010-0421)\n\nDan Rosenberg discovered that Pango incorrectly handled certain\nFT_Bitmap objects. If a user were tricked into displaying text with a\nspecially- crafted font, an attacker could cause a denial of service\nor execute arbitrary code with privileges of the user invoking the\nprogram. The default compiler options for affected releases should\nreduce the vulnerability to a denial of service. (CVE-2011-0020)\n\nIt was discovered that Pango incorrectly handled certain memory\nreallocation failures. If a user were tricked into displaying text in\na way that would cause a reallocation failure, an attacker could cause\na denial of service or execute arbitrary code with privileges of the\nuser invoking the program. This issue only affected Ubuntu 9.10, 10.04\nLTS and 10.10. (CVE-2011-0064).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 23, "published": "2011-03-03T00:00:00", "title": "Ubuntu 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : pango1.0 vulnerabilities (USN-1082-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0421", "CVE-2011-0020", "CVE-2011-0064"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:libpango1.0-0-dbg", "p-cpe:/a:canonical:ubuntu_linux:libpango1.0-0", "cpe:/o:canonical:ubuntu_linux:10.04:-:lts", "cpe:/o:canonical:ubuntu_linux:8.04:-:lts", "cpe:/o:canonical:ubuntu_linux:10.10", "cpe:/o:canonical:ubuntu_linux:9.10", "p-cpe:/a:canonical:ubuntu_linux:gir1.0-pango-1.0", "p-cpe:/a:canonical:ubuntu_linux:libpango1.0-doc", "p-cpe:/a:canonical:ubuntu_linux:libpango1.0-dev", "p-cpe:/a:canonical:ubuntu_linux:libpango1.0-common"], "id": "UBUNTU_USN-1082-1.NASL", "href": "https://www.tenable.com/plugins/nessus/52529", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1082-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(52529);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/09/19 12:54:26\");\n\n script_cve_id(\"CVE-2010-0421\", \"CVE-2011-0020\", \"CVE-2011-0064\");\n script_bugtraq_id(38760, 45842, 46632);\n script_xref(name:\"USN\", value:\"1082-1\");\n\n script_name(english:\"Ubuntu 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : pango1.0 vulnerabilities (USN-1082-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Marc Schoenefeld discovered that Pango incorrectly handled certain\nGlyph Definition (GDEF) tables. If a user were tricked into displaying\ntext with a specially crafted font, an attacker could cause Pango to\ncrash, resulting in a denial of service. This issue only affected\nUbuntu 8.04 LTS and 9.10. (CVE-2010-0421)\n\nDan Rosenberg discovered that Pango incorrectly handled certain\nFT_Bitmap objects. If a user were tricked into displaying text with a\nspecially- crafted font, an attacker could cause a denial of service\nor execute arbitrary code with privileges of the user invoking the\nprogram. The default compiler options for affected releases should\nreduce the vulnerability to a denial of service. (CVE-2011-0020)\n\nIt was discovered that Pango incorrectly handled certain memory\nreallocation failures. If a user were tricked into displaying text in\na way that would cause a reallocation failure, an attacker could cause\na denial of service or execute arbitrary code with privileges of the\nuser invoking the program. This issue only affected Ubuntu 9.10, 10.04\nLTS and 10.10. (CVE-2011-0064).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1082-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:gir1.0-pango-1.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libpango1.0-0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libpango1.0-0-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libpango1.0-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libpango1.0-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libpango1.0-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:8.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:9.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/03/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/03/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/03/03\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2011-2019 Canonical, Inc. / NASL script (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(8\\.04|9\\.10|10\\.04|10\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 8.04 / 9.10 / 10.04 / 10.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"8.04\", pkgname:\"libpango1.0-0\", pkgver:\"1.20.5-0ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"libpango1.0-0-dbg\", pkgver:\"1.20.5-0ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"libpango1.0-common\", pkgver:\"1.20.5-0ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"libpango1.0-dev\", pkgver:\"1.20.5-0ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"libpango1.0-doc\", pkgver:\"1.20.5-0ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"libpango1.0-0\", pkgver:\"1.26.0-1ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"libpango1.0-0-dbg\", pkgver:\"1.26.0-1ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"libpango1.0-common\", pkgver:\"1.26.0-1ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"libpango1.0-dev\", pkgver:\"1.26.0-1ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"libpango1.0-doc\", pkgver:\"1.26.0-1ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"gir1.0-pango-1.0\", pkgver:\"1.28.0-0ubuntu2.2\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libpango1.0-0\", pkgver:\"1.28.0-0ubuntu2.2\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libpango1.0-0-dbg\", pkgver:\"1.28.0-0ubuntu2.2\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libpango1.0-common\", pkgver:\"1.28.0-0ubuntu2.2\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libpango1.0-dev\", pkgver:\"1.28.0-0ubuntu2.2\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libpango1.0-doc\", pkgver:\"1.28.0-0ubuntu2.2\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"gir1.0-pango-1.0\", pkgver:\"1.28.2-0ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libpango1.0-0\", pkgver:\"1.28.2-0ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libpango1.0-0-dbg\", pkgver:\"1.28.2-0ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libpango1.0-common\", pkgver:\"1.28.2-0ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libpango1.0-dev\", pkgver:\"1.28.2-0ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libpango1.0-doc\", pkgver:\"1.28.2-0ubuntu1.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gir1.0-pango-1.0 / libpango1.0-0 / libpango1.0-0-dbg / etc\");\n}\n", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2019-05-29T18:36:03", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-0020"], "description": "Oracle Linux Local Security Checks ELSA-2011-0180", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310122275", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310122275", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2011-0180", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2011-0180.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.122275\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:15:49 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2011-0180\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2011-0180\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2011-0180.html\");\n script_cve_id(\"CVE-2011-0020\");\n script_tag(name:\"cvss_base\", value:\"7.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux(5|6)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"pango\", rpm:\"pango~1.14.9~8.0.1.el5_6.2\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"pango-devel\", rpm:\"pango-devel~1.14.9~8.0.1.el5_6.2\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"pango\", rpm:\"pango~1.28.1~3.el6_0.3\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"pango-devel\", rpm:\"pango-devel~1.28.1~3.el6_0.3\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:39:36", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-0020"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2011-02-11T00:00:00", "id": "OPENVAS:1361412562310880472", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880472", "type": "openvas", "title": "CentOS Update for evolution28-pango CESA-2011:0180 centos4 i386", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for evolution28-pango CESA-2011:0180 centos4 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2011-February/017249.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.880472\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-02-11 13:26:17 +0100 (Fri, 11 Feb 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"CESA\", value:\"2011:0180\");\n script_cve_id(\"CVE-2011-0020\");\n script_name(\"CentOS Update for evolution28-pango CESA-2011:0180 centos4 i386\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'evolution28-pango'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS4\");\n script_tag(name:\"affected\", value:\"evolution28-pango on CentOS 4\");\n script_tag(name:\"insight\", value:\"Pango is a library used for the layout and rendering of internationalized\n text.\n\n An input sanitization flaw, leading to a heap-based buffer overflow, was\n found in the way Pango displayed font files when using the FreeType font\n engine back end. If a user loaded a malformed font file with an application\n that uses Pango, it could cause the application to crash or, possibly,\n execute arbitrary code with the privileges of the user running the\n application. (CVE-2011-0020)\n\n Users of pango and evolution28-pango are advised to upgrade to these\n updated packages, which contain a backported patch to resolve this issue.\n After installing the updated packages, you must restart your system or\n restart your X session for the update to take effect.\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"evolution28-pango\", rpm:\"evolution28-pango~1.14.9~13.el4_10\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"evolution28-pango-devel\", rpm:\"evolution28-pango-devel~1.14.9~13.el4_10\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:39:34", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-0020"], "description": "The remote host is missing an update for the ", "modified": "2018-11-23T00:00:00", "published": "2011-01-31T00:00:00", "id": "OPENVAS:1361412562310870385", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870385", "type": "openvas", "title": "RedHat Update for pango RHSA-2011:0180-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for pango RHSA-2011:0180-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2011-January/msg00023.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870385\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-31 15:15:14 +0100 (Mon, 31 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"RHSA\", value:\"2011:0180-01\");\n script_cve_id(\"CVE-2011-0020\");\n script_name(\"RedHat Update for pango RHSA-2011:0180-01\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'pango'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_(5|4)\");\n script_tag(name:\"affected\", value:\"pango on Red Hat Enterprise Linux (v. 5 server),\n Red Hat Enterprise Linux AS version 4,\n Red Hat Enterprise Linux ES version 4,\n Red Hat Enterprise Linux WS version 4\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"Pango is a library used for the layout and rendering of internationalized\n text.\n\n An input sanitization flaw, leading to a heap-based buffer overflow, was\n found in the way Pango displayed font files when using the FreeType font\n engine back end. If a user loaded a malformed font file with an application\n that uses Pango, it could cause the application to crash or, possibly,\n execute arbitrary code with the privileges of the user running the\n application. (CVE-2011-0020)\n\n Users of pango and evolution28-pango are advised to upgrade to these\n updated packages, which contain a backported patch to resolve this issue.\n After installing the updated packages, you must restart your system or\n restart your X session for the update to take effect.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"pango\", rpm:\"pango~1.14.9~8.el5_6.2\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"pango-debuginfo\", rpm:\"pango-debuginfo~1.14.9~8.el5_6.2\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"pango-devel\", rpm:\"pango-devel~1.14.9~8.el5_6.2\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"RHENT_4\")\n{\n\n if ((res = isrpmvuln(pkg:\"evolution28-pango\", rpm:\"evolution28-pango~1.14.9~13.el4_10\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"evolution28-pango-debuginfo\", rpm:\"evolution28-pango-debuginfo~1.14.9~13.el4_10\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"evolution28-pango-devel\", rpm:\"evolution28-pango-devel~1.14.9~13.el4_10\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-25T10:55:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-0020"], "description": "Check for the Version of evolution28-pango", "modified": "2017-07-10T00:00:00", "published": "2011-02-11T00:00:00", "id": "OPENVAS:880472", "href": "http://plugins.openvas.org/nasl.php?oid=880472", "type": "openvas", "title": "CentOS Update for evolution28-pango CESA-2011:0180 centos4 i386", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for evolution28-pango CESA-2011:0180 centos4 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Pango is a library used for the layout and rendering of internationalized\n text.\n\n An input sanitization flaw, leading to a heap-based buffer overflow, was\n found in the way Pango displayed font files when using the FreeType font\n engine back end. If a user loaded a malformed font file with an application\n that uses Pango, it could cause the application to crash or, possibly,\n execute arbitrary code with the privileges of the user running the\n application. (CVE-2011-0020)\n \n Users of pango and evolution28-pango are advised to upgrade to these\n updated packages, which contain a backported patch to resolve this issue.\n After installing the updated packages, you must restart your system or\n restart your X session for the update to take effect.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"evolution28-pango on CentOS 4\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2011-February/017249.html\");\n script_id(880472);\n script_version(\"$Revision: 6653 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:46:53 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-02-11 13:26:17 +0100 (Fri, 11 Feb 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2011:0180\");\n script_cve_id(\"CVE-2011-0020\");\n script_name(\"CentOS Update for evolution28-pango CESA-2011:0180 centos4 i386\");\n\n script_summary(\"Check for the Version of evolution28-pango\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"evolution28-pango\", rpm:\"evolution28-pango~1.14.9~13.el4_10\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"evolution28-pango-devel\", rpm:\"evolution28-pango-devel~1.14.9~13.el4_10\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-01-02T10:58:17", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-0020"], "description": "Check for the Version of evolution28-pango", "modified": "2017-12-28T00:00:00", "published": "2012-07-30T00:00:00", "id": "OPENVAS:881404", "href": "http://plugins.openvas.org/nasl.php?oid=881404", "type": "openvas", "title": "CentOS Update for evolution28-pango CESA-2011:0180 centos4 x86_64", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for evolution28-pango CESA-2011:0180 centos4 x86_64\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Pango is a library used for the layout and rendering of internationalized\n text.\n\n An input sanitization flaw, leading to a heap-based buffer overflow, was\n found in the way Pango displayed font files when using the FreeType font\n engine back end. If a user loaded a malformed font file with an application\n that uses Pango, it could cause the application to crash or, possibly,\n execute arbitrary code with the privileges of the user running the\n application. (CVE-2011-0020)\n \n Users of pango and evolution28-pango are advised to upgrade to these\n updated packages, which contain a backported patch to resolve this issue.\n After installing the updated packages, you must restart your system or\n restart your X session for the update to take effect.\";\n\ntag_affected = \"evolution28-pango on CentOS 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2011-February/017250.html\");\n script_id(881404);\n script_version(\"$Revision: 8253 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-28 07:29:51 +0100 (Thu, 28 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-07-30 17:46:35 +0530 (Mon, 30 Jul 2012)\");\n script_cve_id(\"CVE-2011-0020\");\n script_tag(name:\"cvss_base\", value:\"7.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2011:0180\");\n script_name(\"CentOS Update for evolution28-pango CESA-2011:0180 centos4 x86_64\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of evolution28-pango\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"evolution28-pango\", rpm:\"evolution28-pango~1.14.9~13.el4_10\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"evolution28-pango-devel\", rpm:\"evolution28-pango-devel~1.14.9~13.el4_10\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:39:17", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-0020"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2012-07-30T00:00:00", "id": "OPENVAS:1361412562310881404", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881404", "type": "openvas", "title": "CentOS Update for evolution28-pango CESA-2011:0180 centos4 x86_64", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for evolution28-pango CESA-2011:0180 centos4 x86_64\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2011-February/017250.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881404\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-07-30 17:46:35 +0530 (Mon, 30 Jul 2012)\");\n script_cve_id(\"CVE-2011-0020\");\n script_tag(name:\"cvss_base\", value:\"7.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"CESA\", value:\"2011:0180\");\n script_name(\"CentOS Update for evolution28-pango CESA-2011:0180 centos4 x86_64\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'evolution28-pango'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS4\");\n script_tag(name:\"affected\", value:\"evolution28-pango on CentOS 4\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"Pango is a library used for the layout and rendering of internationalized\n text.\n\n An input sanitization flaw, leading to a heap-based buffer overflow, was\n found in the way Pango displayed font files when using the FreeType font\n engine back end. If a user loaded a malformed font file with an application\n that uses Pango, it could cause the application to crash or, possibly,\n execute arbitrary code with the privileges of the user running the\n application. (CVE-2011-0020)\n\n Users of pango and evolution28-pango are advised to upgrade to these\n updated packages, which contain a backported patch to resolve this issue.\n After installing the updated packages, you must restart your system or\n restart your X session for the update to take effect.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"evolution28-pango\", rpm:\"evolution28-pango~1.14.9~13.el4_10\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"evolution28-pango-devel\", rpm:\"evolution28-pango-devel~1.14.9~13.el4_10\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-27T10:55:07", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-0020"], "description": "Check for the Version of pango", "modified": "2017-07-12T00:00:00", "published": "2011-01-31T00:00:00", "id": "OPENVAS:870385", "href": "http://plugins.openvas.org/nasl.php?oid=870385", "type": "openvas", "title": "RedHat Update for pango RHSA-2011:0180-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for pango RHSA-2011:0180-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Pango is a library used for the layout and rendering of internationalized\n text.\n\n An input sanitization flaw, leading to a heap-based buffer overflow, was\n found in the way Pango displayed font files when using the FreeType font\n engine back end. If a user loaded a malformed font file with an application\n that uses Pango, it could cause the application to crash or, possibly,\n execute arbitrary code with the privileges of the user running the\n application. (CVE-2011-0020)\n \n Users of pango and evolution28-pango are advised to upgrade to these\n updated packages, which contain a backported patch to resolve this issue.\n After installing the updated packages, you must restart your system or\n restart your X session for the update to take effect.\";\n\ntag_affected = \"pango on Red Hat Enterprise Linux (v. 5 server),\n Red Hat Enterprise Linux AS version 4,\n Red Hat Enterprise Linux ES version 4,\n Red Hat Enterprise Linux WS version 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2011-January/msg00023.html\");\n script_id(870385);\n script_version(\"$Revision: 6685 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-12 11:44:46 +0200 (Wed, 12 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-31 15:15:14 +0100 (Mon, 31 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"RHSA\", value: \"2011:0180-01\");\n script_cve_id(\"CVE-2011-0020\");\n script_name(\"RedHat Update for pango RHSA-2011:0180-01\");\n\n script_summary(\"Check for the Version of pango\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"pango\", rpm:\"pango~1.14.9~8.el5_6.2\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"pango-debuginfo\", rpm:\"pango-debuginfo~1.14.9~8.el5_6.2\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"pango-devel\", rpm:\"pango-devel~1.14.9~8.el5_6.2\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"RHENT_4\")\n{\n\n if ((res = isrpmvuln(pkg:\"evolution28-pango\", rpm:\"evolution28-pango~1.14.9~13.el4_10\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"evolution28-pango-debuginfo\", rpm:\"evolution28-pango-debuginfo~1.14.9~13.el4_10\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"evolution28-pango-devel\", rpm:\"evolution28-pango-devel~1.14.9~13.el4_10\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-12-04T11:27:19", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0421", "CVE-2011-0020", "CVE-2011-0064"], "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1082-1", "modified": "2017-12-01T00:00:00", "published": "2011-03-07T00:00:00", "id": "OPENVAS:840602", "href": "http://plugins.openvas.org/nasl.php?oid=840602", "type": "openvas", "title": "Ubuntu Update for pango1.0 vulnerabilities USN-1082-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1082_1.nasl 7964 2017-12-01 07:32:11Z santu $\n#\n# Ubuntu Update for pango1.0 vulnerabilities USN-1082-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Marc Schoenefeld discovered that Pango incorrectly handled certain Glyph\n Definition (GDEF) tables. If a user were tricked into displaying text with\n a specially-crafted font, an attacker could cause Pango to crash, resulting\n in a denial of service. This issue only affected Ubuntu 8.04 LTS and 9.10.\n (CVE-2010-0421)\n\n Dan Rosenberg discovered that Pango incorrectly handled certain FT_Bitmap\n objects. If a user were tricked into displaying text with a specially-\n crafted font, an attacker could cause a denial of service or execute\n arbitrary code with privileges of the user invoking the program. The\n default compiler options for affected releases should reduce the\n vulnerability to a denial of service. (CVE-2011-0020)\n \n It was discovered that Pango incorrectly handled certain memory\n reallocation failures. If a user were tricked into displaying text in a way\n that would cause a reallocation failure, an attacker could cause a denial\n of service or execute arbitrary code with privileges of the user invoking\n the program. This issue only affected Ubuntu 9.10, 10.04 LTS and 10.10.\n (CVE-2011-0064)\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1082-1\";\ntag_affected = \"pango1.0 vulnerabilities on Ubuntu 8.04 LTS ,\n Ubuntu 9.10 ,\n Ubuntu 10.04 LTS ,\n Ubuntu 10.10\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1082-1/\");\n script_id(840602);\n script_version(\"$Revision: 7964 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 08:32:11 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-03-07 06:45:55 +0100 (Mon, 07 Mar 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"USN\", value: \"1082-1\");\n script_cve_id(\"CVE-2010-0421\", \"CVE-2011-0020\", \"CVE-2011-0064\");\n script_name(\"Ubuntu Update for pango1.0 vulnerabilities USN-1082-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU9.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-0-dbg\", ver:\"1.26.0-1ubuntu0.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-0\", ver:\"1.26.0-1ubuntu0.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-dev\", ver:\"1.26.0-1ubuntu0.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-common\", ver:\"1.26.0-1ubuntu0.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-doc\", ver:\"1.26.0-1ubuntu0.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-udeb\", ver:\"1.26.0-1ubuntu0.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"gir1.0-pango-1.0\", ver:\"1.28.2-0ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-0-dbg\", ver:\"1.28.2-0ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-0\", ver:\"1.28.2-0ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-dev\", ver:\"1.28.2-0ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-common\", ver:\"1.28.2-0ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-doc\", ver:\"1.28.2-0ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-udeb\", ver:\"1.28.2-0ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"gir1.0-pango-1.0\", ver:\"1.28.0-0ubuntu2.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-0-dbg\", ver:\"1.28.0-0ubuntu2.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-0\", ver:\"1.28.0-0ubuntu2.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-dev\", ver:\"1.28.0-0ubuntu2.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-common\", ver:\"1.28.0-0ubuntu2.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-doc\", ver:\"1.28.0-0ubuntu2.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-udeb\", ver:\"1.28.0-0ubuntu2.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU8.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-0-dbg\", ver:\"1.20.5-0ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-0\", ver:\"1.20.5-0ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-dev\", ver:\"1.20.5-0ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-common\", ver:\"1.20.5-0ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-doc\", ver:\"1.20.5-0ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-udeb\", ver:\"1.20.5-0ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:39:33", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0421", "CVE-2011-0020", "CVE-2011-0064"], "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1082-1", "modified": "2019-03-13T00:00:00", "published": "2011-03-07T00:00:00", "id": "OPENVAS:1361412562310840602", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310840602", "type": "openvas", "title": "Ubuntu Update for pango1.0 vulnerabilities USN-1082-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1082_1.nasl 14132 2019-03-13 09:25:59Z cfischer $\n#\n# Ubuntu Update for pango1.0 vulnerabilities USN-1082-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-1082-1/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.840602\");\n script_version(\"$Revision: 14132 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 10:25:59 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-03-07 06:45:55 +0100 (Mon, 07 Mar 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"USN\", value:\"1082-1\");\n script_cve_id(\"CVE-2010-0421\", \"CVE-2011-0020\", \"CVE-2011-0064\");\n script_name(\"Ubuntu Update for pango1.0 vulnerabilities USN-1082-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(9\\.10|10\\.10|10\\.04 LTS|8\\.04 LTS)\");\n script_tag(name:\"summary\", value:\"Ubuntu Update for Linux kernel vulnerabilities USN-1082-1\");\n script_tag(name:\"affected\", value:\"pango1.0 vulnerabilities on Ubuntu 8.04 LTS,\n Ubuntu 9.10,\n Ubuntu 10.04 LTS,\n Ubuntu 10.10\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"Marc Schoenefeld discovered that Pango incorrectly handled certain Glyph\n Definition (GDEF) tables. If a user were tricked into displaying text with\n a specially-crafted font, an attacker could cause Pango to crash, resulting\n in a denial of service. This issue only affected Ubuntu 8.04 LTS and 9.10.\n (CVE-2010-0421)\n\n Dan Rosenberg discovered that Pango incorrectly handled certain FT_Bitmap\n objects. If a user were tricked into displaying text with a specially-\n crafted font, an attacker could cause a denial of service or execute\n arbitrary code with privileges of the user invoking the program. The\n default compiler options for affected releases should reduce the\n vulnerability to a denial of service. (CVE-2011-0020)\n\n It was discovered that Pango incorrectly handled certain memory\n reallocation failures. If a user were tricked into displaying text in a way\n that would cause a reallocation failure, an attacker could cause a denial\n of service or execute arbitrary code with privileges of the user invoking\n the program. This issue only affected Ubuntu 9.10, 10.04 LTS and 10.10.\n (CVE-2011-0064)\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU9.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-0-dbg\", ver:\"1.26.0-1ubuntu0.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-0\", ver:\"1.26.0-1ubuntu0.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-dev\", ver:\"1.26.0-1ubuntu0.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-common\", ver:\"1.26.0-1ubuntu0.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-doc\", ver:\"1.26.0-1ubuntu0.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-udeb\", ver:\"1.26.0-1ubuntu0.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"gir1.0-pango-1.0\", ver:\"1.28.2-0ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-0-dbg\", ver:\"1.28.2-0ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-0\", ver:\"1.28.2-0ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-dev\", ver:\"1.28.2-0ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-common\", ver:\"1.28.2-0ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-doc\", ver:\"1.28.2-0ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-udeb\", ver:\"1.28.2-0ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"gir1.0-pango-1.0\", ver:\"1.28.0-0ubuntu2.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-0-dbg\", ver:\"1.28.0-0ubuntu2.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-0\", ver:\"1.28.0-0ubuntu2.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-dev\", ver:\"1.28.0-0ubuntu2.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-common\", ver:\"1.28.0-0ubuntu2.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-doc\", ver:\"1.28.0-0ubuntu2.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-udeb\", ver:\"1.28.0-0ubuntu2.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU8.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-0-dbg\", ver:\"1.20.5-0ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-0\", ver:\"1.20.5-0ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-dev\", ver:\"1.20.5-0ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-common\", ver:\"1.20.5-0ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-doc\", ver:\"1.20.5-0ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libpango1.0-udeb\", ver:\"1.20.5-0ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:30", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2468", "CVE-2009-1194", "CVE-2011-0020", "CVE-2011-0064"], "description": "Gentoo Linux Local Security Checks GLSA 201405-13", "modified": "2018-10-26T00:00:00", "published": "2015-09-29T00:00:00", "id": "OPENVAS:1361412562310121188", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310121188", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201405-13", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa-201405-13.nasl 12128 2018-10-26 13:35:25Z cfischer $\n#\n# Gentoo Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.121188\");\n script_version(\"$Revision: 12128 $\");\n script_tag(name:\"creation_date\", value:\"2015-09-29 11:27:11 +0300 (Tue, 29 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-26 15:35:25 +0200 (Fri, 26 Oct 2018) $\");\n script_name(\"Gentoo Security Advisory GLSA 201405-13\");\n script_tag(name:\"insight\", value:\"Multiple vulnerabilities have been discovered in Pango. Please review the CVE identifiers referenced below for details.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://security.gentoo.org/glsa/201405-13\");\n script_cve_id(\"CVE-2009-1194\", \"CVE-2009-2468\", \"CVE-2011-0020\", \"CVE-2011-0064\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Gentoo Linux Local Security Checks GLSA 201405-13\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Gentoo Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\n\nif((res=ispkgvuln(pkg:\"x11-libs/pango\", unaffected: make_list(\"ge 1.28.3-r1\"), vulnerable: make_list(\"lt 1.28.3-r1\"))) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "ubuntu": [{"lastseen": "2020-07-09T00:32:51", "bulletinFamily": "unix", "cvelist": ["CVE-2010-0421", "CVE-2011-0020", "CVE-2011-0064"], "description": "Marc Schoenefeld discovered that Pango incorrectly handled certain Glyph \nDefinition (GDEF) tables. If a user were tricked into displaying text with \na specially-crafted font, an attacker could cause Pango to crash, resulting \nin a denial of service. This issue only affected Ubuntu 8.04 LTS and 9.10. \n(CVE-2010-0421)\n\nDan Rosenberg discovered that Pango incorrectly handled certain FT_Bitmap \nobjects. If a user were tricked into displaying text with a specially- \ncrafted font, an attacker could cause a denial of service or execute \narbitrary code with privileges of the user invoking the program. The \ndefault compiler options for affected releases should reduce the \nvulnerability to a denial of service. (CVE-2011-0020)\n\nIt was discovered that Pango incorrectly handled certain memory \nreallocation failures. If a user were tricked into displaying text in a way \nthat would cause a reallocation failure, an attacker could cause a denial \nof service or execute arbitrary code with privileges of the user invoking \nthe program. This issue only affected Ubuntu 9.10, 10.04 LTS and 10.10. \n(CVE-2011-0064)", "edition": 5, "modified": "2011-03-02T00:00:00", "published": "2011-03-02T00:00:00", "id": "USN-1082-1", "href": "https://ubuntu.com/security/notices/USN-1082-1", "title": "Pango vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:24", "bulletinFamily": "unix", "cvelist": ["CVE-2009-2468", "CVE-2009-1194", "CVE-2011-0020", "CVE-2011-0064"], "edition": 1, "description": "### Background\n\nPango is an internationalized text layout and rendering library\n\n### Description\n\nMultiple vulnerabilities have been discovered in Pango. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA context-dependent attacker could entice a user to load specially crafted text using an application linked against Pango, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Pango users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=x11-libs/pango-1.28.3-r1\"\n \n\nPackages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying some of these packages. \n\nNOTE: This is a legacy GLSA. Updates for all affected architectures are available since March 18, 2011. It is likely that your system is already no longer affected by this issue.", "modified": "2014-05-17T00:00:00", "published": "2014-05-17T00:00:00", "id": "GLSA-201405-13", "href": "https://security.gentoo.org/glsa/201405-13", "type": "gentoo", "title": "Pango: Multiple vulnerabilities", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}